Cisco ICND1 1.1: Fundamentals of Networking

Overview/DescriptionTo understand how networks function, it is important to gain a basic understanding of the major components of a network. This course introduces fundamental computer and network components, as well as the characteristics, functions, benefits, metrics, and attributes used to characterize features and performance. This course also introduces the Open Systems Interconnection (OSI) and TCP/IP reference models, as well as data communications terms and concepts. Finally, this course introduces the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) application.

Cisco ICND1 1.1: Network Connections and Communications

Overview/DescriptionData networks, including the Internet, are responsible for supplying reliable, transparent communication for people and applications. Data from applications such as e-mail, web browsers and instant messaging is packaged, transported and delivered to its destination continually. The OSI models Transport layer handles most of the addressing functions for data transmission and is responsible for end-to-end transfer of application data. This course introduces some of the main protocols that operate at the Transport layer, such as TCP, UDP, and ARP and describes the process of packet delivery.

Cisco ICND1 1.1: Switching in LANs

Overview/DescriptionLANs are a relatively low-cost means of sharing expensive resources. LANs allow multiple users in a fairly small geographic area to exchange files and messages, and to access shared resources such as file servers. LANs have rapidly evolved into support systems that are critical to communications within an organization. Properly configured and managed network devices are important tools for the efficient and safe operation of LANs. Cisco IOS Software is a feature-rich network operating system software that provides network intelligence for business-critical solutions. This course describes the challenges that shared LANs face as they confront the increasing need for bandwidth and speed to satisfy the needs of multiple users. This course also introduces the Cisco IOS Software as well as its basic configuration.

Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security

Overview/DescriptionAfter physical access has been secured, there is growing need to ensure that access to the switch via the console port and the vty ports is secure. In addition, it is important to ensure that unused switch ports do not become a security hole. And as devices are added to LANs to accommodate more users, and more networked software applications require more bandwidth, maintaining an acceptable level of network performance becomes an increasing challenge. There are a number of ways to enhance switched Ethernet LANs to meet the demands of users for performance and availability. This course describes how to secure switch ports as well as several performance-enhancement methods. This course also describes methods for identifying and resolving common switched network issues.

Cisco ICND1 1.1: Implementing Wireless LANs

Overview/DescriptionHistorically, LANs have been limited to physical wired segments. With the advent of technologies that utilized infrared and RF to carry data, LANs were freed from the limitations of a physical media. This course describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access. With the extension of LANs, new types of applications appeared, such as VoIP. This course also briefly describes the main drivers of VoIP implementations on LANs.

Cisco ICND1 1.1: Routing and Cisco Routers

Overview/DescriptionBeyond connecting multiple devices in a network, the networks themselves can be connected. In fact, the Internet is a collection of networks that are connected. The concept of connected networks is a common communication infrastructure in large organizations. Connecting networks with diverse devices, architectures, and protocols requires more sophisticated components than simple LANs. Routers are the devices that are used in this more complex networking environment, and a suite of protocols that is known as TCP/IP governs how data is transmitted. This course describes the functions of routers in connecting networks, and describes how routers transmit data through networks using TCP/IP.

Overview/DescriptionUnderstanding the packet delivery process is a fundamental part of understanding how Cisco networking devices work. Once you have an understanding of how data travels in your network, securing and managing your resources is paramount. This course describes the process of packet delivery and then goes on to discuss data security, particularly how this is handled by Cisco’s Router and Security Device Manager. This course then goes on to describe some of the ways resources are managed, such as DHCP for addressing and the use of remote access tools to perform configuration and maintenance tasks.

Cisco ICND1 1.1: WAN Technologies

Overview/DescriptionWhen sites are located at different geographic locations, a WAN provides interconnections between the sites. There are several types of WANs, including point-to-point leased lines, circuit-switched networks, and packet-switched networks, which are discussed in this course. Routing is the process by which information gets from one location to another. It is important to understand how the various routing protocols determine IP routes. This course describes the features and operation of static routing, default routing, and Routing Information Protocol. As organizations merge, addresses sometimes become limited or addressing conflicts arise. Network Address Translation (NAT) and Port Address Translation (PAT) are two protocols that you can use to address these issues and these protocols are also described in this course.

Cisco ICND1 1.1: WAN Encapsulation and RIP Routing

Overview/DescriptionOne of the most common types of WAN connection is the point-to-point connection. A point-to-point connection is also referred to as a serial connection or leased-line connection, because the lines are leased from a carrier and are dedicated for use by the company leasing the lines. Understanding how point-to-point communication links function to provide access to a WAN is important to an overall understanding of how WANs function. This course describes the protocols that are used to encapsulate both data link layer and network layer information over serial links and how to configure them. This course also describes the basic features and operation of RIP, and explains how to enable RIP on an IP network.

Cisco ICND1 1.1: Managing the Network Environment

Overview/DescriptionThe network staff is responsible for ensuring that the underlying communications infrastructure is capable of supporting business objectives and associated applications. Network staff is also responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course describes commands and processes to determine network operational status; gather information about remote devices; and manage Cisco IOS images, configuration files, and devices on a network.

Cisco ICND1 1.1: LAN Addressing

Overview/DescriptionSubnetworks, also known as subnets, are very common in all but the smallest of network environments. Subnetworks segment the network into smaller divisions that have their own addresses. Each host is represented by a unique IP address, which can be represented in either binary or decimal form for computers and users, respectively. In some cases, some of the bits that are used for the host portion of an IP address are “borrowed” to create the subnet address. The subnet mask defines which part of the IP address represents the network part. This course explains binary numbers and describes how subnets function and how they are computed.

Cisco ICND2 1.1: Implementing VLANS and Trunks

Overview/DescriptionAs small networks grow and become more complex, greater functionality and control over network components (delivered through more sophisticated network devices such as switches and routers) becomes critical. Most Cisco hardware platforms implement Cisco IOS Software, including switches and routers. This software enables network services in Cisco products, including carrying the chosen network protocols and functions; controlling access and prohibiting unauthorized network use; and adding interfaces and capability as needed for network growth. You use the command-line interface (CLI) of the Cisco IOS Software to enter the configuration details into the Cisco switches and routers that implement the network requirements of an organization. This course provides a review of the Cisco IOS command-line interface (CLI) structure and the Cisco IOS commands that are used to create a basic router and switch configuration. A VLAN is a group of end stations with a common set of requirements, independent of their physical location. A VLAN has the same attributes as a physical LAN, except that it lets you group end stations even when they are not physically located on the same LAN segment. A VLAN also lets you group ports on a switch so that you can limit unicast, multicast, and broadcast traffic flooding. Flooded traffic that originates from a particular VLAN floods only to the ports belonging to that VLAN. VLAN trunks with IEEE 802.1Q tagging facilitate interswitch communication with multiple VLANs. Cisco Catalyst switches feature VLAN Trunking Protocol (VTP) to simplify management of VLANs across multiple switches. Understanding the operation of VLANs and the associated protocols is important for configuring, verifying, and troubleshooting VLANs on Cisco access switches. This course also describes VLAN operations and their associated protocols.

Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing

Overview/DescriptionMost complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some issues, it can introduce other problems. Spanning-Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in a switched network. This course identifies the problems that are caused by redundant switched-network topologies and the functionality of STP to prevent these problems. Routing is the process of determining where to send data packets that are destined for addresses outside of the local network. Routers gather and maintain routing information to enable the transmission and receipt of data packets. For traffic to cross from one VLAN to another, a Layer 3 process is necessary. This course describes the basics of inter-VLAN routing operations, including subinterfaces and router on a stick.

Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network

Overview/DescriptionSecurity is a major concern, especially in today’s networks, and network administrators must pay close attention to it. Complete network security starts with device-based security on routers and switches. Routers and switches that are internal to an organization often have minimal security configurations. This minimal security renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. This course discusses security features that exist to protect switches and Layer 2 operations. It is also important to keep in mind that as the number of switch features grows, so does the possibility that things will go wrong. This course also presents recommendations for implementing a functional network. It addresses some of the common reasons that port connectivity, VLAN configuration, VLAN Trunking Protocol (VTP), and Spanning Tree Protocol (STP) can fail. It also describes the information to look for to identify the source of the problem.

Cisco ICND2 1.1: Medium-Sized Routed Network Construction

Overview/DescriptionRouting is the process by which information moves from one location to another. Routers gather and maintain routing information to enable the transmission and receipt of these data packets. Routing information takes the form of entries in a routing table, with one entry for each identified route. The router can use a routing protocol to create and maintain the routing table dynamically so that network changes can be accommodated whenever they occur. To effectively manage an IP network, you must understand the operation of dynamic routing protocols and the impact that they have on an IP network. This course describes the operation and limitations of distance vector and link-state routing protocols. Classless routing protocols scale better than classful routing protocols and the main reason why is that they support Variable-Length Subnet Masks (VLSMs) and route summarization. VLSMs were developed to allow multiple levels of subnetworked IP addresses within a single network. Protocols that have VLSM support include Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP). VLSM is a key technology on large routed networks and understanding the capabilities of VLSM is important when you are planning large networks. This course describes the capabilities of VLSMs.

Cisco ICND2 1.1: Single-Area OSPF Implementation

Overview/DescriptionOpen Shortest Path First (OSPF) is a classless interior gateway protocol (IGP). It is used within larger autonomous system networks in preference to the legacy distance vector routing protocols. OSPF is designated by the Internet Engineering Task Force (IETF) as one of several IGPs. Because OSPF is a widely deployed standard protocol, knowledge of its configuration and maintenance is essential. This course describes the function of OSPF and explains how to configure a single-area OSPF network on a Cisco router. Because it is a link-state routing protocol, Open Shortest Path First (OSPF) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course also introduces some of the common issues surrounding an OSPF network and a flowchart approach to troubleshooting these issues.

Cisco ICND2 1.1: EIGRP Implementation

Overview/DescriptionEnhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol that was developed by Cisco. EIGRP is suited for many different topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices. This course describes how to configure and monitor EIGRP. As an advanced distance vector routing protocol, Enhanced Interior Gateway Routing Protocol (EIGRP) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course introduces some of the common problems surrounding an EIGRP network and a flowchart approach to troubleshooting these problems.

Cisco ICND2 1.1: Introducing ACL Operation

Overview/DescriptionAccess control is very important within any organization and once you understand the uses of Access Control Lists (ACLs), you can determine how to implement them on your Cisco network. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, Quality of Service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). This course describes some of the applications for ACLs on Cisco networks, identifies the different types of ACLs that can be implemented, and explains how Cisco IOS Software processes ACLs.

Cisco ICND2 1.1: Configuring and Troubleshooting ACLs

Overview/DescriptionStandard and extended Cisco IOS access control lists (ACLs) can be used to classify IP packets. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, quality of service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). You can also configure standard and extended Cisco IOS ACLs on router interfaces for access control (security). Cisco IOS features are applied on interfaces for specific directions (inbound versus outbound). This course describes the steps that you use to configure named and numbered, standard, and extended access control lists (ACLs). This course also explains how to verify that the ACLs are functioning properly, and discusses some common configuration errors to avoid.

Cisco ICND2 1.1: Scaling the Network with NAT and PAT

Overview/DescriptionTwo Internet scalability challenges are the depletion of registered IP version 4 (IPv4) address space and scaling in routing. Network Address Translation (NAT) and Port Address Translation (PAT) are mechanisms for conserving registered IPv4 addresses in large networks and simplifying IPv4 address management tasks. NAT and PAT translate IPv4 addresses within private internal networks to legal IPv4 addresses for transport over public external networks, such as the Internet, without requiring a registered subnet address. Incoming traffic is translated back for delivery within the inside network. This translation of IPv4 addresses eliminates the need for host renumbering and allows the same IPv4 address range to be used in multiple intranets. This course describes the features that NAT and PAT offer and shows you how to configure NAT and PAT on Cisco routers.

Cisco ICND2 1.1: Transitioning to IPv6

Overview/DescriptionThe ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. To cope with the depletion of IP addresses, several short-term solutions were developed. Two short-term solutions are private addresses and Network Address Translation (NAT). Although private addresses with DHCP and NAT have helped to reduce the need for IP addresses, a more general solution was required. IP version 6 (IPv6) satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy. IPv6 uses some different address types that make IPv6 more efficient than IPv4. This course describes the different types of addresses that IPv6 uses and how to assign these addresses. Transitioning to IPv6 from IPv4 deployments can require various techniques, including an autoconfiguration function. Which transition mechanism you will use depends on the needs of your network. This course describes the different types of transition mechanisms for an IPv6 network.

Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections

Overview/DescriptionCisco virtual private network (VPN) solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. By integrating advanced network intelligence and routing, Cisco VPNs reliably transport complex mission-critical traffic, such as voice and client-server applications, without compromising communications quality or security. This course describes the uses of VPNs for site-to-site and remote-user access and the benefits of VPN implementations and the underlying hardware, software, and protocols that are required to configure a VPN solution are also covered. One of the most common types of WAN connection is the point-to-point connection. Point-to- point connections are used to connect LANs to service provider WANs, and to connect LAN segments within an enterprise network. A LAN-to-WAN point-to-point connection is also referred to as a serial connection or leased-line connection. Wide-area networking services are typically leased from a service provider. Some WAN services operate as Layer 2 connections between your remote locations and are typically provided by a telephone company (telco) provider over its WAN switches. Point-to-Point Protocol (PPP) emerged as an encapsulation protocol for transporting IP traffic over point-to-point (leased line) serial connections. PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. This course describes the operation, configuration, and verification of PPP.

Cisco ICND2 1.1: Frame Relay Connections

Overview/DescriptionFrame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. It was standardized by the ITU-T. Frame Relay was one of the most extensively used WAN protocols, primarily because it was inexpensive compared to dedicated lines. In addition, configuring user equipment in a Frame Relay network is very simple. This course describes Frame Relay operation, configuration, and troubleshooting. A Frame Relay network offers a few additional benefits that a leased-line implementation does not offer. But with these benefits comes a bit more complexity. The addition of concepts such as Non-broadcast Multiple Access (NBMA), Local Management Interface (LMI), Inverse Address Resolution Protocol (ARP), and Frame Relay maps require that an administrator has a fundamental knowledge of these concepts to better troubleshoot connectivity issues that may arise. This course describes the basic steps that are used to troubleshoot a Frame Relay WAN. How to identify and resolve the most common Frame Relay connectivity issues are also covered.

Cisco CCNA Composite Exam 640-802 Curriculum Outline

Cisco ICND1 1.1: Fundamentals of Networking

Overview/DescriptionTo understand how networks function, it is important to gain a basic understanding of the major components of a network. This course introduces fundamental computer and network components, as well as the characteristics, functions, benefits, metrics, and attributes used to characterize features and performance. This course also introduces the Open Systems Interconnection (OSI) and TCP/IP reference models, as well as data communications terms and concepts. Finally, this course introduces the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) application.

Cisco ICND1 1.1: Network Connections and Communications

Overview/DescriptionData networks, including the Internet, are responsible for supplying reliable, transparent communication for people and applications. Data from applications such as e-mail, web browsers and instant messaging is packaged, transported and delivered to its destination continually. The OSI models Transport layer handles most of the addressing functions for data transmission and is responsible for end-to-end transfer of application data. This course introduces some of the main protocols that operate at the Transport layer, such as TCP, UDP, and ARP and describes the process of packet delivery.

Cisco ICND1 1.1: Switching in LANs

Overview/DescriptionLANs are a relatively low-cost means of sharing expensive resources. LANs allow multiple users in a fairly small geographic area to exchange files and messages, and to access shared resources such as file servers. LANs have rapidly evolved into support systems that are critical to communications within an organization. Properly configured and managed network devices are important tools for the efficient and safe operation of LANs. Cisco IOS Software is a feature-rich network operating system software that provides network intelligence for business-critical solutions. This course describes the challenges that shared LANs face as they confront the increasing need for bandwidth and speed to satisfy the needs of multiple users. This course also introduces the Cisco IOS Software as well as its basic configuration.

Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security

Overview/DescriptionAfter physical access has been secured, there is growing need to ensure that access to the switch via the console port and the vty ports is secure. In addition, it is important to ensure that unused switch ports do not become a security hole. And as devices are added to LANs to accommodate more users, and more networked software applications require more bandwidth, maintaining an acceptable level of network performance becomes an increasing challenge. There are a number of ways to enhance switched Ethernet LANs to meet the demands of users for performance and availability. This course describes how to secure switch ports as well as several performance-enhancement methods. This course also describes methods for identifying and resolving common switched network issues.

Cisco ICND1 1.1: Implementing Wireless LANs

Overview/DescriptionHistorically, LANs have been limited to physical wired segments. With the advent of technologies that utilized infrared and RF to carry data, LANs were freed from the limitations of a physical media. This course describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access. With the extension of LANs, new types of applications appeared, such as VoIP. This course also briefly describes the main drivers of VoIP implementations on LANs.

Cisco ICND1 1.1: Routing and Cisco Routers

Overview/DescriptionBeyond connecting multiple devices in a network, the networks themselves can be connected. In fact, the Internet is a collection of networks that are connected. The concept of connected networks is a common communication infrastructure in large organizations. Connecting networks with diverse devices, architectures, and protocols requires more sophisticated components than simple LANs. Routers are the devices that are used in this more complex networking environment, and a suite of protocols that is known as TCP/IP governs how data is transmitted. This course describes the functions of routers in connecting networks, and describes how routers transmit data through networks using TCP/IP.

Cisco ICND1 1.1: LAN Addressing

Overview/DescriptionSubnetworks, also known as subnets, are very common in all but the smallest of network environments. Subnetworks segment the network into smaller divisions that have their own addresses. Each host is represented by a unique IP address, which can be represented in either binary or decimal form for computers and users, respectively. In some cases, some of the bits that are used for the host portion of an IP address are “borrowed” to create the subnet address. The subnet mask defines which part of the IP address represents the network part. This course explains binary numbers and describes how subnets function and how they are computed.

Overview/DescriptionUnderstanding the packet delivery process is a fundamental part of understanding how Cisco networking devices work. Once you have an understanding of how data travels in your network, securing and managing your resources is paramount. This course describes the process of packet delivery and then goes on to discuss data security, particularly how this is handled by Cisco’s Router and Security Device Manager. This course then goes on to describe some of the ways resources are managed, such as DHCP for addressing and the use of remote access tools to perform configuration and maintenance tasks.

Cisco ICND1 1.1: WAN Technologies

Overview/DescriptionWhen sites are located at different geographic locations, a WAN provides interconnections between the sites. There are several types of WANs, including point-to-point leased lines, circuit-switched networks, and packet-switched networks, which are discussed in this course. Routing is the process by which information gets from one location to another. It is important to understand how the various routing protocols determine IP routes. This course describes the features and operation of static routing, default routing, and Routing Information Protocol. As organizations merge, addresses sometimes become limited or addressing conflicts arise. Network Address Translation (NAT) and Port Address Translation (PAT) are two protocols that you can use to address these issues and these protocols are also described in this course.

Cisco ICND1 1.1: WAN Encapsulation and RIP Routing

Overview/DescriptionOne of the most common types of WAN connection is the point-to-point connection. A point-to-point connection is also referred to as a serial connection or leased-line connection, because the lines are leased from a carrier and are dedicated for use by the company leasing the lines. Understanding how point-to-point communication links function to provide access to a WAN is important to an overall understanding of how WANs function. This course describes the protocols that are used to encapsulate both data link layer and network layer information over serial links and how to configure them. This course also describes the basic features and operation of RIP, and explains how to enable RIP on an IP network.

Cisco ICND1 1.1: Managing the Network Environment

Overview/DescriptionThe network staff is responsible for ensuring that the underlying communications infrastructure is capable of supporting business objectives and associated applications. Network staff is also responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course describes commands and processes to determine network operational status; gather information about remote devices; and manage Cisco IOS images, configuration files, and devices on a network.

Cisco ICND2 1.1: Implementing VLANS and Trunks

Overview/DescriptionAs small networks grow and become more complex, greater functionality and control over network components (delivered through more sophisticated network devices such as switches and routers) becomes critical. Most Cisco hardware platforms implement Cisco IOS Software, including switches and routers. This software enables network services in Cisco products, including carrying the chosen network protocols and functions; controlling access and prohibiting unauthorized network use; and adding interfaces and capability as needed for network growth. You use the command-line interface (CLI) of the Cisco IOS Software to enter the configuration details into the Cisco switches and routers that implement the network requirements of an organization. This course provides a review of the Cisco IOS command-line interface (CLI) structure and the Cisco IOS commands that are used to create a basic router and switch configuration. A VLAN is a group of end stations with a common set of requirements, independent of their physical location. A VLAN has the same attributes as a physical LAN, except that it lets you group end stations even when they are not physically located on the same LAN segment. A VLAN also lets you group ports on a switch so that you can limit unicast, multicast, and broadcast traffic flooding. Flooded traffic that originates from a particular VLAN floods only to the ports belonging to that VLAN. VLAN trunks with IEEE 802.1Q tagging facilitate interswitch communication with multiple VLANs. Cisco Catalyst switches feature VLAN Trunking Protocol (VTP) to simplify management of VLANs across multiple switches. Understanding the operation of VLANs and the associated protocols is important for configuring, verifying, and troubleshooting VLANs on Cisco access switches. This course also describes VLAN operations and their associated protocols.

Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing

Overview/DescriptionMost complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some issues, it can introduce other problems. Spanning-Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in a switched network. This course identifies the problems that are caused by redundant switched-network topologies and the functionality of STP to prevent these problems. Routing is the process of determining where to send data packets that are destined for addresses outside of the local network. Routers gather and maintain routing information to enable the transmission and receipt of data packets. For traffic to cross from one VLAN to another, a Layer 3 process is necessary. This course describes the basics of inter-VLAN routing operations, including subinterfaces and router on a stick.

Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network

Overview/DescriptionSecurity is a major concern, especially in today’s networks, and network administrators must pay close attention to it. Complete network security starts with device-based security on routers and switches. Routers and switches that are internal to an organization often have minimal security configurations. This minimal security renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. This course discusses security features that exist to protect switches and Layer 2 operations. It is also important to keep in mind that as the number of switch features grows, so does the possibility that things will go wrong. This course also presents recommendations for implementing a functional network. It addresses some of the common reasons that port connectivity, VLAN configuration, VLAN Trunking Protocol (VTP), and Spanning Tree Protocol (STP) can fail. It also describes the information to look for to identify the source of the problem.

Cisco ICND2 1.1: Medium-Sized Routed Network Construction

Overview/DescriptionRouting is the process by which information moves from one location to another. Routers gather and maintain routing information to enable the transmission and receipt of these data packets. Routing information takes the form of entries in a routing table, with one entry for each identified route. The router can use a routing protocol to create and maintain the routing table dynamically so that network changes can be accommodated whenever they occur. To effectively manage an IP network, you must understand the operation of dynamic routing protocols and the impact that they have on an IP network. This course describes the operation and limitations of distance vector and link-state routing protocols. Classless routing protocols scale better than classful routing protocols and the main reason why is that they support Variable-Length Subnet Masks (VLSMs) and route summarization. VLSMs were developed to allow multiple levels of subnetworked IP addresses within a single network. Protocols that have VLSM support include Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP). VLSM is a key technology on large routed networks and understanding the capabilities of VLSM is important when you are planning large networks. This course describes the capabilities of VLSMs.

Cisco ICND2 1.1: Single-Area OSPF Implementation

Overview/DescriptionOpen Shortest Path First (OSPF) is a classless interior gateway protocol (IGP). It is used within larger autonomous system networks in preference to the legacy distance vector routing protocols. OSPF is designated by the Internet Engineering Task Force (IETF) as one of several IGPs. Because OSPF is a widely deployed standard protocol, knowledge of its configuration and maintenance is essential. This course describes the function of OSPF and explains how to configure a single-area OSPF network on a Cisco router. Because it is a link-state routing protocol, Open Shortest Path First (OSPF) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course also introduces some of the common issues surrounding an OSPF network and a flowchart approach to troubleshooting these issues.

Cisco ICND2 1.1: EIGRP Implementation

Overview/DescriptionEnhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol that was developed by Cisco. EIGRP is suited for many different topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices. This course describes how to configure and monitor EIGRP. As an advanced distance vector routing protocol, Enhanced Interior Gateway Routing Protocol (EIGRP) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course introduces some of the common problems surrounding an EIGRP network and a flowchart approach to troubleshooting these problems.

Cisco ICND2 1.1: Introducing ACL Operation

Overview/DescriptionAccess control is very important within any organization and once you understand the uses of Access Control Lists (ACLs), you can determine how to implement them on your Cisco network. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, Quality of Service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). This course describes some of the applications for ACLs on Cisco networks, identifies the different types of ACLs that can be implemented, and explains how Cisco IOS Software processes ACLs.

Cisco ICND2 1.1: Configuring and Troubleshooting ACLs

Overview/DescriptionStandard and extended Cisco IOS access control lists (ACLs) can be used to classify IP packets. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, quality of service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). You can also configure standard and extended Cisco IOS ACLs on router interfaces for access control (security). Cisco IOS features are applied on interfaces for specific directions (inbound versus outbound). This course describes the steps that you use to configure named and numbered, standard, and extended access control lists (ACLs). This course also explains how to verify that the ACLs are functioning properly, and discusses some common configuration errors to avoid.

Cisco ICND2 1.1: Scaling the Network with NAT and PAT

Overview/DescriptionTwo Internet scalability challenges are the depletion of registered IP version 4 (IPv4) address space and scaling in routing. Network Address Translation (NAT) and Port Address Translation (PAT) are mechanisms for conserving registered IPv4 addresses in large networks and simplifying IPv4 address management tasks. NAT and PAT translate IPv4 addresses within private internal networks to legal IPv4 addresses for transport over public external networks, such as the Internet, without requiring a registered subnet address. Incoming traffic is translated back for delivery within the inside network. This translation of IPv4 addresses eliminates the need for host renumbering and allows the same IPv4 address range to be used in multiple intranets. This course describes the features that NAT and PAT offer and shows you how to configure NAT and PAT on Cisco routers.

Cisco ICND2 1.1: Transitioning to IPv6

Overview/DescriptionThe ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. To cope with the depletion of IP addresses, several short-term solutions were developed. Two short-term solutions are private addresses and Network Address Translation (NAT). Although private addresses with DHCP and NAT have helped to reduce the need for IP addresses, a more general solution was required. IP version 6 (IPv6) satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy. IPv6 uses some different address types that make IPv6 more efficient than IPv4. This course describes the different types of addresses that IPv6 uses and how to assign these addresses. Transitioning to IPv6 from IPv4 deployments can require various techniques, including an autoconfiguration function. Which transition mechanism you will use depends on the needs of your network. This course describes the different types of transition mechanisms for an IPv6 network.

Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections

Overview/DescriptionCisco virtual private network (VPN) solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. By integrating advanced network intelligence and routing, Cisco VPNs reliably transport complex mission-critical traffic, such as voice and client-server applications, without compromising communications quality or security. This course describes the uses of VPNs for site-to-site and remote-user access and the benefits of VPN implementations and the underlying hardware, software, and protocols that are required to configure a VPN solution are also covered. One of the most common types of WAN connection is the point-to-point connection. Point-to- point connections are used to connect LANs to service provider WANs, and to connect LAN segments within an enterprise network. A LAN-to-WAN point-to-point connection is also referred to as a serial connection or leased-line connection. Wide-area networking services are typically leased from a service provider. Some WAN services operate as Layer 2 connections between your remote locations and are typically provided by a telephone company (telco) provider over its WAN switches. Point-to-Point Protocol (PPP) emerged as an encapsulation protocol for transporting IP traffic over point-to-point (leased line) serial connections. PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. This course describes the operation, configuration, and verification of PPP.

Cisco ICND2 1.1: Frame Relay Connections

Overview/DescriptionFrame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. It was standardized by the ITU-T. Frame Relay was one of the most extensively used WAN protocols, primarily because it was inexpensive compared to dedicated lines. In addition, configuring user equipment in a Frame Relay network is very simple. This course describes Frame Relay operation, configuration, and troubleshooting. A Frame Relay network offers a few additional benefits that a leased-line implementation does not offer. But with these benefits comes a bit more complexity. The addition of concepts such as Non-broadcast Multiple Access (NBMA), Local Management Interface (LMI), Inverse Address Resolution Protocol (ARP), and Frame Relay maps require that an administrator has a fundamental knowledge of these concepts to better troubleshoot connectivity issues that may arise. This course describes the basic steps that are used to troubleshoot a Frame Relay WAN. How to identify and resolve the most common Frame Relay connectivity issues are also covered.

Cisco IINS 1.0: Network Security Principles I

Overview/DescriptionThe open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data remains uncompromised. With the challenges of increased availability requirements and growing regulatory requirements, establishing and maintaining a secure network computing environment is becoming increasingly difficult. This course provides an explanation of the core principles that are part of the secure network environment. It explains how sophisticated attack tools and open networks generate an increased need for network security and dynamic security policies, the primary objectives of security and primary types of security controls, as well as some of the factors that are involved in responding to a security breach. Examining who hackers are, what motivates them, and how they do what they do, as well as variety of attacks against confidentiality, integrity, and availability and some of the best practices to defeat them are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Network Security Principles II

Overview/DescriptionOperations security concerns the day-to-day practices necessary to first deploy and later maintain a secure system. As an administrator, its very important to understand the principles behind operations security. Its equally important to know that the security policy thats developed in your organization drives all of the steps taken to secure network resources. In order to create an effective security policy, it is necessary to do a risk analysis in order to maximize the effectiveness of the policy. Also, it is essential that everyone is aware of the policy, or it is doomed to fail. This course explains the principles behind operations security and how correct practices increase security, including security testing, a secure life cycle, and business continuity planning. In addition, it reviews how increasing network security threats demand comprehensive network security policies, and describes the main activities in each phase of a secure network life cycle. Implementing the Cisco Self-Defending Network strategy by enhancing the existing network infrastructure with Cisco technologies, products, and solutions is also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Perimeter Security

Overview/DescriptionTraffic from outside a closed network that has a destination inside a closed network passes through the network perimeter. The routers at the network perimeter are an important initial point of network security. This course explains how to use the CLI to configure routers on the network perimeter with Cisco IOS Software security features, including securing the physical installation of and administrative access to Cisco routers based on different network requirements. It explores the features and uses of SDM, and how to configure a Cisco router to perform AAA authentication with a local database using the Cisco SDM. This course also covers the operation of external AAA sources such as RADIUS and TACACS+ servers, how to configure a Cisco router to perform AAA, and how to securely implement the management and reporting features of syslog, SNMP, SSH, and NTP. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Network Security Using Cisco IOS Firewalls

Overview/DescriptionImplementing network-wide security can be a daunting task depending on the size and business of the company. Organizations must balance the cost in staff and equipment to implement a network security policy against the potential costs of network security breaches. Cisco provides several router-based solutions for implementing firewall features: basic traffic filtering capabilities using access control lists (ACLs), Cisco IOS Firewalls, and Cisco IOS zone-based policy firewalls. This course explains the operations of the different types of firewall technologies and describes the firewall technologies that are embedded in Cisco routers and Cisco security appliances. The processes of creating static packet filters using ACLs, and configuring a Cisco IOS zone-based policy firewall on your network using the Cisco SDM wizard are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Cryptography, Encryption, and Digital Signatures

Overview/DescriptionCryptographic services form the foundation for many security implementations and provide both confidentiality and integrity of data when that data might be exposed to untrusted parties. Understanding the basic functions of cryptography and how encryption and hashing provide confidentiality and integrity help in the creation of a successful security policy. It is also important to have a good understanding of the issues involved in key management. Cryptographic hashes and digital signatures play a major role in modern cryptosystems, and it is important to have a good understanding of the basic mechanisms of these algorithms and some of the issues that are involved in choosing a particular hashing algorithm or digital signature method. This course provides a primer on the theory of cryptography. It discusses the principles behind symmetric encryption, provides examples of major symmetric encryption algorithms, and examines their operations, strengths, and weaknesses. This course also touches on the major hashing algorithms that use Hashed Message Authentication Code (HMAC), and the digital signature technologies that are widely used in modern computing and networking. It also describes some of the real-world implications of using various algorithms and technologies. The principles behind asymmetric encryption and provides examples of major asymmetric encryption algorithms, including Rivest, Shamir, and Adleman (RSA); Diffie-Hellman (DH); and public key infrastructure (PKI) are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: IP Security Site-to-Site Virtual Private Networks

Overview/DescriptionAn IPsec VPN uses the Internet to connect branch offices, remote employees, and business partners to your company’s resources. It is a reliable way to maintain your company privacy while streamlining operations, reducing costs, and allowing flexible network administration. This course explains the fundamental VPN-related concepts and technologies, and describes how to configure an IPsec site-to-site VPN tunnel using both the command-line interface (CLI) and the Cisco Router and Security Device Manager (SDM). This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Network Security Using Cisco IOS IPS

Overview/DescriptionIn technological environments, Internet worms and viruses can spread across the world in a matter of minutes. Without the luxury of time to react, a network needs to be able to instantaneously recognize and mitigate worm and virus threats. A networking architecture paradigm shift is required to defend against these fast-moving attacks. Its no longer possible to contain the intrusions at a few points in the network. Intrusion prevention is required throughout the entire network to detect and stop an attack at every ingress and egress point in the network. The most scalable and cost-effective way to accomplish this is by integrating intrusion prevention systems (IPSs) into the access points of the network. This course provides the knowledge and skills required to configure IPSs on Cisco routers. This course is one of a series from the IINS 1.0 SkillSoft learning paths, which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: LAN, SAN, Voice, and Endpoint Security

Overview/DescriptionIt is important to have a good understanding of the additional aspects of network security, such as LAN, storage area network (SAN), voice, and endpoints. An understanding of how to place emphasis on Layer 2 and host security to provide a much more comprehensive coverage of the important issues involved in securing an enterprise is also crucial. This course explains how to configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network traffic. This course also provides an overview of the basic principles of SANs and SAN security. The implications of implementing security measures in IP networks that transport voice are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Cisco IINS 1.0: Mitigating Layer 2 Attacks

Overview/DescriptionLike routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers, and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers to do a great deal of damage. This course examines various Layer 2 attacks and strategies to mitigate them. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

PrerequisitesKnowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); working knowledge of the Windows Operating System; working knowledge of Cisco IOS networking and concepts.

Cisco Certified Network Associate Security (CCNA™ Security) authenticates the associate-level knowledge and skills that are required
to troubleshoot, monitor and secure Cisco networks. Those IT professionals with CCNA™ Security certifications can demonstrate the
skills required to recognize threats and develop a security infrastructure. CCNA™ Security certified IT personnel can also
maintain integrity and confidentiality as well as availability of data and services in the technologies Cisco utilizes in
its security structure.

CBT Direct boasts the most beneficial online certification training on the market. With online training, you have the
flexibility to study on your schedule, and with the speed and reliability of the internet, CBT Direct’s Cisco CCNA Security
training course is accessible anywhere you have an internet connection. Convenience finally costs less with CBT Direct – the
most affordable online certification training solution today. CBT Direct is also a Cisco Registered Partner.

CBT Direct also offers online mentoring for over 100 current major certification exams, including Cisco CCNA Security,
for IT professionals and end-users alike. CBT Direct’s mentors have a minimum of 20 certifications each and are available 24/7*.* Available for most courses.

You’ll learn how to combat threats to security and recognize the motivations and typical attacks that hackers use and
understand the difference between confidentiality, integrity and availability attacks. Click here to see a detailed curriculum outline.

You’ll become familiar with the functions and characteristics of a security policy’s standards, guidelines and procedures and
learn how to manage risk. You’ll also recognize how changing threats and new challenges demand a new approach to
network security.

You will also recognize the benefits and solution components of a Cisco Self-Defending Network,
Cisco Integrated Services Routers and Cisco SDM.

Learn how a static packet filter allows or blocks data packets as they pass through a network interface.
Become familiar with the different types and features of firewalls, including inspection, transparent and Cisco
IOS firewalls function.

Study cryptology, algorithms, ciphers and hashes and become an expert on what to do and exactly when.
Defend against endpoint attacks and prevent hacking on VoIP networks.